An improper input validation in FortiAI v1.4.0 and earlier may allow an authenticated user to gain system shell access via a malicious payload in the "diagnose" command.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-033 | Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-21-033 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/advisory/FG-IR-21-033 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 7.8 |
Information
Published : 2021-06-03 15:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24023
Mitre link : CVE-2021-24023
CVE.ORG link : CVE-2021-24023
JSON object : View
Products Affected
fortinet
- fortiai_3500f
- fortiai_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')